TRG Managed Security Services
TRG's SOC (Security Operations Centre) offers outsourced cyber security management services that include preparing the customer's environment through, continuous monitoring and threat detection, incident response, security audits and vulnerability assessments, and security awareness training. The SOC's focus is not only on threat detection and response but also on proactively preparing the customer's environment to ensure systems are in the best state to defend against threats, and performing continuous monitoring and assessments to ensure the environment remains secure.
Managed Firewall
We provide a cost-effective and efficient way for companies to safeguard their network and data from cyber attacks, while the choice of the firewall technology gives the flexibility to adapt to your organizations specific needs.
TRG has the skill and expertise to service customers with a variety of other firewall technologies.
Managed Endpoint Detection & Response
Achieve greater cross-surface visibility and take action in real time with one agent for automated, enterprise-grade prevention, detection, response, and hunting across endpoint, cloud, and identity.
One-Click roll back in case of Ransomware attack.
Managed Mail Security
Block any email-borne threat, including spam, phishing, business email compromise (BEC), malware, advanced persistent threats (APTs), and zero-days before it reaches end-users.
Managed by TRG Security Operations Centre who provides ongoing monitoring and management to ensure that email is properly protected and that any threats are quickly identified and mitigated.
Managed Data Loss Prevention
It’s easy for sensitive information on endpoint computers to escape your organization through peripheral devices, local interfaces, and various network channels.
To prevent leakage due to employee negligence or malicious insiders, you need data loss prevention (DLP) capabilities that block any unauthorized attempts to transfer sensitive data.
Managed Device & URL Filtering
A comprehensive security solution that provides an additional layer of protection to endpoints by offering URL filtering, device control features with a remote device wipe capability.
Block access to potentially dangerous or unwanted websites, while the device control features govern connections and port use, giving you full control over how your devices connect to the network.
DarkWeb Monitoring & User Awareness & Simulated Phishing
Thousands of email addresses, passwords and other sensitive data land on the dark web every day, creating risk for your business and you may not even know about a vulnerability until it’s too late.
User Education Training & Simulated Phishing is required per POPI, it also assists users your "human firewall" to protect your organisation from most common threat.
Our SOC focuses on threat detection, response and proactively preparing the customer's environment.
To help keep your business safe, our protection approach aligns with the National Institute of Standards and Technology (NIST) framework
Identify vulnerabilities in your IT infrastructure and perform auto-discovery of devices in your network
Protect with best practices in security, management, software updates, and more
Detect threats and provide strong defenses against malware/ransomware
Respond using Cyber Protection Operations Center alerts and support in the event of a cyberattack
Recover in a data loss scenario, we can quickly remediate and restore lost data and systems remotely to full operations with little to no downtime and preform a full forensic investigation